Blog

Are You Ready to Put Your Passwords to the Test?

Posted by Kirt McReynolds on October 29, 2018 at 10:30 AM

Using a password manager is a must in today’s world where we have so many passwords, credit cards and online accounts at risk of getting hacked.  It’s also becoming no longer acceptable to only use a password manager.  A password manager should help us be proactive about our passwords and let us know if we have an account at a company (website) that has been breached.  What if the password that you used at this compromised site was also used at other sites?  How do you know or remember that?

Read More

6 Common Questions About Cloud Computing

Posted by Integrity Staff on October 25, 2018 at 10:00 AM

You may be asking yourself several questions about cloud computing the more you hear about it.

After all, a RightScale survey shows enterprises are leveraging multiple clouds to do business.

There’s a lot of buzz around cloud computing, and rightfully so. Let’s take a look at the most common questions about cloud computing.

Read More

Social Engineering: Is Your Company at Risk?

Posted by Koffi Koudite on October 22, 2018 at 9:00 AM

Social Engineering is a tactic used by cyber criminals to manipulate individuals to gain confidential information such as social security number, credit card number, passwords, etc.

In the cyber security world, the weakest link in the security chain are the users, which is why people are the target when it comes to social engineering. It doesn’t matter how many security measures you have in place. You can have locks on your doors, an alarm system, the latest firewalls, and network or security monitoring tools; all it takes to hack into your network is to trick a user into clicking on a malicious link they think came from a social media site.

Read More

Why Security Awareness in Healthcare is Critical

Posted by Integrity Staff on October 21, 2018 at 10:00 AM

Security Awareness training and programming is important for every industry. Security Awareness in healthcare is especially critical. The healthcare industry is responsible for the safekeeping of highly sensitive medical data. HIPAA tries to ensure that security is tight and materials are handled correctly, but that only goes so far. Any breach of a medical organization's network or data can be highly damaging to the practice in question. HIPAA violations come at a steep cost and a lost reputation is something that may never be recovered. Every organization in the healthcare industry needs Security Awareness training. This is why:

Read More

Which Type of Cloud Solution is Right For Your Business?

Posted by Integrity Staff on October 18, 2018 at 10:00 AM

Deciding on a cloud solution can be difficult.

If you think you have a choice on whether you’ll be migrating to the cloud, think again.

Enterprise cloud adoption has doubled in the past two years. Roughly half of respondents to a cloud business intelligence survey said they were using cloud BI. Additionally, fewer respondents said they had no plans to use these services. The 2018 survey showed the most significant rise in adoption levels in the seven years this survey has been conducted.

Cloud adoption is all but inevitable.

This begs the question: which cloud solution is best for my business?

Read More

Getting the Full Potential from Your Smartphone

Posted by Kirt McReynolds on October 17, 2018 at 10:00 AM

As the number of mobile phone users in the world is expected to pass the five billion mark by 2019, manufacturers are continually looking for ways to enhance smartphone usage. Even with larger devices, smartphones, and tablet computers for that matter, are often used for content consumption rather than content creation. I suspect that many of us struggle with accurately creating long or detailed documents or emails on our smartphones. The concept of “docking” your smartphone like you would a laptop computer has been around for some time. As more mobility features have been introduced into computing over the last few years the options are better than ever to turn your smartphone into a true desktop PC experience.

Read More

How Technology Consulting Can Help Your Business Avoid Disaster

Posted by Integrity Staff on October 13, 2018 at 9:00 AM

It can be difficult to manage and run a large business, especially if you’re doing it mostly alone. Even if you have a partner, there’s no guarantee that you will be able to protect your business from everything. With the recent rise of phishing scams, security breaches, and account hacking, who is to say your business is not the next target?

Read More

When Was Your Last Cybersecurity Assessment?

Posted by Integrity Staff on October 12, 2018 at 10:00 AM

Can you recall the last time you changed your passwords, updated your privacy policy, or changed information on one of your private accounts? Or, to put it simply, when was the last time you had someone make sure your online data was safe?

If the answer to any of those questions is, “No,” then it would be wise to schedule a cybersecurity assessment as soon as possible. This can go for companies or for individuals, but companies carry the larger burden. Having so much information stored in one place makes businesses an easy target.

Read More

How Cloud Computing Promotes Collaboration

Posted by Integrity Staff on October 11, 2018 at 10:00 AM

Cloud computing is great for the enterprise because it promotes collaboration.

With cloud data, multiple people can share, edit, and work together on documents and other files. This information is typically stored off premises and outside a company firewall in what’s called a public cloud.

Here are several ways cloud computing promotes collaboration among teams.

Read More

Fax Machines Provide Attackers Easy Access to Infect Servers and PC’s

Posted by Integrity Staff on October 10, 2018 at 10:00 AM

Did you know that a security vulnerability in your fax machine could allow an attacker to bypass your firewall and access your confidential network resources?   Fax machines use 1980’s technology and are relied upon heavily in the healthcare industry to help transmit patient information between providers.  We often don’t give them a second thought after plugging them in, but they can represent a real risk to your organization’s data.

Read More

5 Benefits Of Security Awareness Training

Posted by Integrity Staff on October 9, 2018 at 9:04 AM

When a new hire comes aboard, all great businesses have this in common: comprehensive training. It's the mark of a great business because it shows the attention and care that goes into equipping employees with the tools they need to succeed at the company.

Read More

4 Reasons to Adopt Cloud Computing Today

Posted by Integrity Staff on October 4, 2018 at 10:00 AM

If you haven’t adopted cloud computing for your business yet, chances are you’re not too far behind.

Cloud adoption levels have nearly doubled since 2016, according to Louis Columbus' analysis of the 2018 Cloud Computing and Business Intelligence Market Study by Dresner Advisory Services.

In particular, 77 percent of enterprises have at least one application or a portion of their enterprise computing infrastructure in the cloud.

Why are executive leading a migration to the cloud? Here are four potential reasons.

Read More

Why Your Business Needs an Effective Security Awareness Program

Posted by Janie Rainey on October 1, 2018 at 10:00 AM

Imagine you are sitting at your desk, working on a project, juggling emails and instant messages, and suddenly an email comes in from the CEO of the company. She is asking “do you have time to do me a favor?”  Your first reaction is to email her back and say, “yes of course I do”. After all it is the CEO and you are a team player. She responds by asking you to go pick up multiple gift cards for clients and email her the gift card numbers.

Read More